Data Protection — News
Is your social network secure? Do you even know where the account security and privacy settings are, or what the default settings are? A recent survey conducted by ESET illustrates the relative insecurity of social networks--which is alarming given the volume and sensitivity of information that is shared on them.
A 19-year-old British man who remains the lone suspect detained for a series of successful cyberstrikes by the hacking group Lulz Security will remain in police custody until at least Saturday, a London court ruled Thursday.
India has issued digital identities to about 9.5 million people so far, and plans to step up enrollment to 1 million a day from October, the head of the agency issuing the biometric identities said on Thursday at a conference in Bangalore.
Ukraine's security service said on Thursday it had disrupted a cybercrime ring that cost the banking industry more than US$72 million using Conficker, a fast-spreading worm unleashed in 2008.
Incident-response forensics company Mandiant has received strategic investments from two separate investment firms with the aim of expanding the company's field staff that responds to security breaches as well as investing more in research and development.
The rush toward virtualisation of internal enterprise computing resources and cloud computing can have many advantages, such as server consolidation, but it's largely outracing traditional security and identity management practices. That's leaving huge gaps, a sense of chaos and questions about where security products and services should be applied in the world of multi-vendor virtual-machine (VM) hypervisors.
Reader Ash wants to know if there's a way to password-protect individual folders in Windows 7:
The Gillard Government's decision to set up legislative framework to allow Australia to sign the Council of Europe Convention on Cybercrime treaty was a good step forward but privacy and civil liberty concerns need to be taken into account, according to a security expert
A hacking group in the Netherlands promises to publish photos, phone numbers and addresses of LulzSec members in response to similar treatment by LulzSec.
Websites belonging to the Brazilian government and energy giant Petrobras were knocked offline Wednesday in a series of cyberattacks.
If it sometimes appears that just about every company is getting hacked these days, that's because they are.
Simon Crosby, the former CTO of Citrix Systems' data center and cloud business, has formed a startup called Bromium that will aim to solve security problems in a cloud environment.
Hack attacks from online thugs such as Anonymous and LulzSec appear to signal a hacker Armageddon. Not only has Sony been relentlessly targeted by hackers this year so has the Central Intelligence Agency, Sega, PBS.com, the U.K. government, and dozens of other high-profile company and government agency Web sites.
With username and password prompts coming at users with every personal and professional login, every once in a while they're bound to forget which combinations go with which access requests.
Cyber attacks are becoming more frequent and severe, and the vast majority of businesses have suffered at least one data breach in the past year, a Ponemon Institute survey says.
Some Tesco Bank customers have been unable to see their accounts for a third day, prompting scores of angry comments online.
Unnoticed in the Tuesday release of Firefox 5 was Mozilla's decision to retire Firefox 4, the browser it shipped just three months ago.
Ethical hacker company, Pure Hacking, has developed a strategic security practice designed to seek out vulnerabilities in companies before black hat hackers find them.
The hacking group known as LulzSec pledged to continue their online rampage Tuesday, a day after U.K. police arrested a man allegedly affiliated with the group.
Sign up now »
Manage and visualize the security and compliance of VMware, physical, and hybrid-cloud infrastructure from the RSA Archer eGRC Platform.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.